Skip to content

jusmistic/exploit-0x41-buffer-overflow

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Exploit Development 0x41 - Buffer Overflow

Docker environment for Secure D Knowledge Sharing day #2 in topic 'Exploit development 0x41 - buffer overflow'.

This Docker is contained 2 Exploitable binary and Exploitation tools.

  • greet - Buffer Overflow Technique.
  • greet2 - Ret2libc Technique.
  • radare2 - Reversing & debugging.
  • gdb & gef - Reversing & debugging .
  • pwntools - Craft an exploit.
  • VIM - Best editor in the world.

How to Run

  1. Disable ASLR

    ./disable_aslr.sh

  2. Build & run Docker

    ./build.sh && ./run.sh

  3. ssh to docker user:user

    ssh user@localhost -p 2222

  4. Pwn an exploitable binary and get a flag!

About

Exploit Development 0x41: Buffer Overflooooooooooow

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published